Secured Login Authentication on Key Attackers

Abstract

An innovative solution is proposed to avoid the problem such as password security at application layer. For password security all lower case characters, upper case characters, special characters and digits in password could be encoded with a random single digit integer number and presented to the user through a Login input interface module. If a valid user enters his password in the form of the sequence code or numeric value from the login input interface module then that describes his password code in place of his actual password characters and for every time solution engine regenerates a new numeric value. When user enters password for each character each time the carriage return key is struck and this approach is known as key logger attack producing and this toughened password is more secure than a conventional password scheme.

Authors and Affiliations

K. Vanitha, M. Manikanta, M. Suresh Kumar

Keywords

Related Articles

Automatic Power Factor Correction using Microcontroller

The main aim of this project is to enhance the power quality by constantly monitoring the load p.f. , when the load p.f. drops below a definite value it results in the rise of line current resulting in more line loss an...

Modelling of Single Point Cutting Tool Deflection due to Cutting Forces under Variable Side Rake Angle

The purpose of this study was to determine the Single point cutting tool deflection due to cutting forces which were developed because of different parameters like feed, depth of cut, cutting speed and also because of g...

Hertz Contact Stress Analysis and Validation Using Finite Element Analysis

In general machines are designed with a set of elements to reduce cost, ease of assembly and manufacturability etc. One also needs to address stress issues at the contact regions between any two elements, stress is indu...

Reduction of scrap on honing machine through DMAIC approach.

DMAIC is an enhancement strategy for attaining customer satisfaction by reducing variation and thus producing products and services better, faster and cheaper. This study of DMAIC approach is on project how the DMAIC me...

slugReview on Security in Wireless Sensor Network

Wireless Sensor Networks (WSN) is an emerging and one of the dominant technology trends in the upcoming decades has posed many potential applications and numerous unique challenges to researches. These networks consist...

Download PDF file
  • EP ID EP23953
  • DOI http://doi.org/10.22214/ijraset.2017.4247
  • Views 252
  • Downloads 10

How To Cite

K. Vanitha, M. Manikanta, M. Suresh Kumar (2017). Secured Login Authentication on Key Attackers. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(4), -. https://europub.co.uk/articles/-A-23953